10 - 12 December, 2019
Park Rotana Abu Dhabi, United Arab Emirates
Park Rotana Abu Dhabi, United Arab Emirates
Conference Day One: Tuesday, 10 December 2019
8:00 am - 8:35 am Registration and Networking
8:35 am - 8:50 am Speed networking
8:50 am - 8:55 am IQPC Welcome Remarks
8:55 am - 9:00 am Visionary Opening address Chairman`s remarks
9:00 am - 9:20 am DEVELOPING FUTURE CYBER SECURITY LEADERS IN THE MENA REGION
- What’s the leadership framework?
- How can we prepare CISOs to predict?
- Creating business value
ADOPTING CLOUD COMPUTING TO YOUR CYBER SECURITY STRATEGY TO PREVENT DATA BREACHES AND DECREASE RISKS
Cloud adoption has reached an all-time high. 81% of organisations now use cloud apps – up from 59% in 2016
9:20 am - 9:40 am REGIONAL GOVERNMENT VISIONARY: IS YOUR DATA IN CLOUD PROTECTED AND FORENSICALLY ENABLED?
- Cloud deployment models – private, public and community; and cloud service models – SaaS, PaaS and IaaS
- How is cloud impacting digital transformation?
- Cloud forensics - Challenges and solutions
- Future research in the field of the digital investigation
9:40 am - 10:20 am THE CISO AND CIO PANEL DEVELOPING INFORMATION ASSURANCE STANDARDS TO PROTECT UAE`S CRITICAL DATA INFORMATION INFRASTRUCTURE AND IMPROVE NATIONAL CYBER SECURITY
- What is the new audit and compliance process?
- How can data protection and authentication solutions can help with compliance?
- Data centres as part of the compliance
Panellists:
INCREASE OF CYBER ATTACKS ON CRITICAL INFRASTRUCTURE
Infrastructure is the new cyber frontline. Cyber-attacks on utilities and other critical infrastructure are not just on the increase, but have transitioned from speculative to indisputable
10:20 am - 10:40 am REGIONAL TRAILBLAZER: PROTECTING CRITICAL INFRASTRUCTURE AGAINST ICT THREAT
- Massive consequences and impact on citizens and businesses
- Power and water shut down including a loss of millions of dollars; Interruption of operations, infrastructure damage and customer data theft
- Addressing the high danger of the cyber attack on nuclear power plants by nation-state threat actors to weaponise their own critical infrastructure against them
- Middle East cyber resilience successful strategy – The delivery of training, services and solutions across organisations
10:40 am - 11:00 am Speed networking
11:00 am - 11:30 am Networking coffee break and refreshments
MALWARE AND RANSOMWARE AWARENESS - PROTECTION FROM CONTINUOUS ATTACKS
Various malwares like “Slingshot” , “Shamoon 2” and “Powershell” has been uncovered in the MENA region which attack and infect victims through compromised routers and can run in kernel mode, giving it complete control over victim devices.
11:30 am - 11:50 am AI - BASED SECURITY SYSTEMS AS A CYBER DEFENCE MECHANISM IN THE FUTURE
- Leveraging cognitive algorithms to learn & predict new malware behaviours
- The need for implementation of anti-malware software to protect your data and organisation from future threats
11:50 am - 12:10 pm HOW TO PREPARE YOURSELF BEFORE A RANSOMWARE OCCURS AND CAUSES THE RISK OF DATA BREACHES AND FINANCIAL LOSSES
- Creating a new innovative security plan against ransomware threats
- Building data backups to prevent from security and data losses
CYBERCRIME, DIGITAL ECONOMY AND INVESTMENT IN CYBER PROTECTION
Cybercrime constitutes a threat not only in terms of financial losses, but also on the wider impact on a growing digital economy
12:10 pm - 12:30 pm REGIONAL TRAILBLAZER: CYBERCRIME LEGISLATION IN THE GCC COUNTRIES: FIT FOR PURPOSE?
- From a legal perspective – The need of having cybercrime laws to which everyone adheres is vital for a safe, trustworthy and secure internet able to drive economic prosperity
- Most GCC cybercrime frameworks are still an incomplete step – What needs to be done more?
Mohammad Khaled
Cybersecurity and digital transformationCybersecurity and digital transformation
12:30 pm - 1:00 pm OPEN DISCUSSION WITH KEY STAKEHOLDERS: CYBERCRIME AS AN ESCALATING THREAT TO THE ECONOMIES OF THE GULF COOPERATION COUNCIL (GCC), AND TO THEIR PLANS FOR DIGITAL TRANSFORMATION
- The need of GCC to explore feasible and practical options for regional and international anti-cybercrime cooperation - Promoting expertise in the judiciary, and enhancing regional and international cooperation arrangements
- Cybercrime and its causes – From financial to loss of intellectual property and confidential business information
1:00 pm - 2:00 pm Lunch break & networking
INTERACTIVE DISCUSSION GROUPS
Interactive Discussions Group (IDGs) are the perfect setting for audiences to come together and discuss their ideas, insights and opinions on specific topics. Each IDG has a leader who will lead the discussion and mention key points that the audience seated can engage in, creating a platform for interactive conversations and learning’s from like-minded individuals, from similar work backgrounds of industries, ultimately leading into a thought-provoking discussion.
IDG A
2:00 pm - 3:00 pm Cyber risk in an Internet of Things worldIDG B
2:00 pm - 3:00 pm Challenges to Cyber Security & How Big Data Analytics Can HelpIDG C
2:00 pm - 3:00 pm AI for cybersecurity is a hot new thing—and a dangerous gambleIDG D
2:00 pm - 3:00 pm Cybersecurity perspective to Blockchain – a decentralised and reliable way of securing and sharing dataIDG E
2:00 pm - 3:00 pm How IoT, AI, and Blockchain will revolutionise business3:00 pm - 3:10 pm Wrap Up & Closing Remarks
3:10 pm - 3:10 pm End of Conference Day One
The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.